{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:04:57Z","timestamp":1775837097966,"version":"3.50.1"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001381","name":"Singapore National Research Foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"crossref"}]},{"name":"International Research Centre @ Singapore Funding Initiative and administered"},{"name":"IDM Programme Office"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2016,9,1]]},"DOI":"10.1109\/tkde.2016.2562628","type":"journal-article","created":{"date-parts":[[2016,5,4]],"date-time":"2016-05-04T18:32:22Z","timestamp":1462386742000},"page":"2407-2422","source":"Crossref","is-referenced-by-count":18,"title":["Microblogging Content Propagation Modeling Using Topic-Specific Behavioral Factors"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3892-4762","authenticated-orcid":false,"given":"Tuan-Anh","family":"Hoang","sequence":"first","affiliation":[]},{"given":"Ee-Peng","family":"Lim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.252631999"},{"key":"ref39","first-page":"1945","article-title":"Coevolve: A joint point process model for information diffusion and network co-evolution","author":"farajtabar","year":"2015","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref38","first-page":"3147","article-title":"Scalable influence estimation in continuous-time diffusion networks","author":"du","year":"2013","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623336"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492611"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20161-5_34"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753486"},{"key":"ref37","first-page":"1","article-title":"Mixture of mutually exciting processes for viral diffusion","author":"yang","year":"2013","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref36","first-page":"666","article-title":"Modeling information propagation with survival theory","author":"gomez-rodriguez","year":"2013","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339540"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871691"},{"key":"ref62","first-page":"516","article-title":"Tweet recommendation with graph co-ranking","author":"yan","year":"2012","journal-title":"Proc Annual Meeting of the Assoc Computational Linguistics"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348372"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963504"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2507177"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/srep02522"},{"key":"ref64","article-title":"A study of &#x201D;churn&#x201D; in tweets and real-time search queries","author":"lin","year":"0","journal-title":"Proc 6th Int AAAI Conf Weblogs Social Media"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935863"},{"key":"ref29","article-title":"Political polarization on Twitter","author":"conover","year":"0","journal-title":"Proc Int AAAI Conf Weblogs Social Media"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970920"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020480"},{"key":"ref2","first-page":"209","article-title":"Why do people retweet? anti-homophily wins the day!","author":"macskassy","year":"2011","journal-title":"Proc 5th Int AAAI Conf Weblogs Social Media"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1787234.1787254"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2009945"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963250"},{"key":"ref24","article-title":"The pulse of news in social media: Forecasting popularity","author":"bandari","year":"0","journal-title":"Proc Int AAAI Conf Weblogs Social Media"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2010.11.003"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1126\/science.1215842"},{"key":"ref25","article-title":"Virality and susceptibility in information diffusions","author":"hoang","year":"0","journal-title":"Proc Int AAAI Conf Weblogs Social Media"},{"key":"ref50","article-title":"Do linguistic style and readability of scientific abstracts affect their virality?","author":"guerini","year":"2012","journal-title":"Proc 6th Int AAAI Conf Weblogs Social Media"},{"key":"ref51","article-title":"From the ground floor: What exactly is viral marketing?","author":"jurvetson","year":"0","journal-title":"Red Herring Communications"},{"key":"ref59","article-title":"Predicting the speed, scale, and range of information diffusion in twitter","author":"yang","year":"2010","journal-title":"Proc Int Conf Weblogs and Social Media"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22309-9_5"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0646-6"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2567997"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783401"},{"key":"ref54","article-title":"Modeling and predicting popularity dynamics via reinforced poisson processes","author":"shen","year":"2014","journal-title":"Proc 28th AAAI Conf Artif Intell"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505523"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963503"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21149"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964875"},{"key":"ref12","author":"parmelee","year":"2011","journal-title":"Politics and the Twitter Revolution How Tweets Influence the Relationship Between Political Leaders and the Public"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2361256.2361258"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963500"},{"key":"ref15","article-title":"Detecting and tracking political abuse in social media","author":"ratkiewicz","year":"2011","journal-title":"Proc 5th Int AAAI Conf Weblogs Social Media"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988739"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718520"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871467"},{"key":"ref19","article-title":"Measuring user influence in Twitter: The million follower fallacy","author":"cha","year":"0","journal-title":"Proc Int AAAI Conf Weblogs Social Media"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.476"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1108\/10662241211250980"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.33"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2013.6785721"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187907"},{"key":"ref49","article-title":"Viral actions: Predicting video view counts using synchronous sharing behaviors","author":"shamma","year":"2011","journal-title":"AAAI Int'l Conf Weblogs and Social Media"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.10.0353"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772752"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401897"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-011-0181-4"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718518"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1017"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187907"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557105"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401914"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/7533522\/07464876.pdf?arnumber=7464876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:02:49Z","timestamp":1642003369000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7464876\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,1]]},"references-count":70,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2016.2562628","relation":{},"ISSN":["1041-4347"],"issn-type":[{"value":"1041-4347","type":"print"}],"subject":[],"published":{"date-parts":[[2016,9,1]]}}}